Information Technology

Effective Date Dec 1, 2014

Applicable Employee Classes:

Reviewed Date:

Approved by:

All Florida Tech Employees

December 2014

Dr. T. Dwayne McCay, President

5.9 Information Technology


Computers and networks provide powerful communication tools and access to resources on campus and around the world. When used appropriately, these tools increase the open exchange of information and advance the mission of the University. Inappropriate use of these tools, however, can infringe on the rights of others. Appropriate use should always be legal and ethical, reflect academic honesty, uphold community standards and show restraint in the consumption of shared resources. Appropriate use should demonstrate respect for intellectual property, ownership of data, system security mechanisms, and individual's right to privacy and to freedom from intimidation, harassment, and unwarranted annoyance.

Persons who connect to Florida Tech's network must abide by the appropriate use policy described here, as well as any campus computing policy, campus Electronic Mail Policy, and all relevant state and federal laws, regulations, and contractual obligations. The use of Florida Tech's technology resources is a privilege, which may be revoked if users fail to comply with these policies. Network Services supports freedom of expression and an open environment to pursue scholarly inquiry. The open sharing of information is encouraged, supported and protected. Network Services does not limit access to information due to its content when such information meets the standard of legality.


As a member of Florida Tech's network community you must abide by the general guidelines listed above, as well as the specific responsibilities listed below. You are responsible for:

  • Registering for your connection: Every computer or network device that connects to the Florida Tech network must be properly registered with Network Services and be properly configured for the network.
  • Installing and maintaining a current anti-virus solution.
  • All network activity originating from your equipment. Every bit of information that comes from your computer, whether you generate it or not, is your responsibility.
  • Protecting the privacy of your accounts. Do not release your personal account information to friends, relatives, roommates, etc. Likewise, do not use a computer account that you are not authorized to use or obtain a password for a computer account not assigned to you.
  • Ensuring the security and integrity of your computer system. In cases where a computer is "hacked into," the user's computer may be temporarily removed from the campus network to prevent an extension of the attack. Every effort will be made to inform the owner of the computer when such action is taken. The user will be expected to secure his/her machine so that it can be reconnected to the network as quickly as possible. (Network Service or the Help desk can be contacted in assisting users to complete this action).

For the complete policy and list of other technology related policies, please visit